Welcome!

News Feed Item

Mayors Gather to Celebrate 40 Years of Community Development Block Grant Funding

WASHINGTON, March 12,  2014 /PRNewswire-USNewswire/ -- Newton, MA Mayor Setti Warren, U.S. Conference of Mayors Community Development and Housing Committee Chair, will lead a delegation of U.S. Mayors on Thursday, March 13th at 2pm to celebrate the success of the Community Development Block Program (CDBG) and to explain the importance of the Grants by providing specific examples of how they are used in their communities. Mayors oppose the cut $200 million cut slated for the program in President Obama's FY 2015 Budget, and believe continued support at current funding levels is critical.

U.S. Conference of Mayors

The mayors are concerned that the President's budget, while touting an Opportunity Agenda that Works for All, does not take into account how critical CDBG funds are for this nation's most vulnerable, including children and senior citizens. CDBG dollars are used to fund daycare programs for young people, meal programs for seniors and housing for the homeless. In a nutshell – CDBG is THE PROGRAM used to help to help our communities recover from the worst recession since the Great Depression.

Since signed into law by President Gerald Ford in 1974, the Community Development Block Grant Program (CDBG) has become the most important federal-city partnership over the last four decades. It is the most targeted and flexible stream of federal dollars allocated directly to cities, and is a proven job creator as the funds are also used to leverage private dollars for small business and economic investment.

Yet, despite its success, the program has been cut by more than twenty-five percent since fiscal year 2010.  And, now, the program is once again on the chopping block in the President's FY '15 budget from $3 billion to $2.8 billion  – particularly at a time when our vulnerable residents need it most.

WHAT: U.S. MAYORS TO CELEBRATE 40 YEARS OF THE COMMUNITY DEVELOPMENT BLOCK GRANT PROGRAM & EXPRESS OPPOSITION TO PROPOSED CUTS

WHEN: Thursday, March 13, 2014 at 2:00 p.m. EST

WHERE: USCM HQ – 1620 I St, NW | 4th Floor | Washington, D.C.  20006

The United States Conference of Mayors is the official non-partisan organization of cities with populations of 30,000 or more. There are nearly 1,400 such cities in the country today. Each city is represented in the Conference by its chief elected official, the mayor. The primary roles of the Conference are to promote the development of effective national urban/suburban policy; strengthen federal-city relationships; ensure that federal policy meets urban needs; provide mayors with leadership and management tools; and create a forum in which mayors can share ideas and information. www.usmayors.org 

Logo - http://photos.prnewswire.com/prnh/20110125/MM36443LOGO

SOURCE The U.S. Conference of Mayors

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Traditional on-premises data centers have long been the domain of modern data platforms like Apache Hadoop, meaning companies who build their business on public cloud were challenged to run Big Data processing and analytics at scale. But recent advancements in Hadoop performance, security, and most importantly cloud-native integrations, are giving organizations the ability to truly gain value from all their data. In his session at 19th Cloud Expo, David Tishgart, Director of Product Marketing ...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, we provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading...
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to impr...
"DevOps is set to be one of the most profound disruptions to hit IT in decades," said Andi Mann. "It is a natural extension of cloud computing, and I have seen both firsthand and in independent research the fantastic results DevOps delivers. So I am excited to help the great team at @DevOpsSUMMIT and CloudEXPO tell the world how they can leverage this emerging disruptive trend."
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
@DevOpsSummit at Cloud Expo, taking place November 12-13 in New York City, NY, is co-located with 22nd international CloudEXPO | first international DXWorldEXPO and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time t...
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes how...
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Andi Mann, Chief Technology Advocate at Splunk, is an accomplished digital business executive with extensive global expertise as a strategist, technologist, innovator, marketer, and communicator. For over 30 years across five continents, he has built success with Fortune 500 corporations, vendors, governments, and as a leading research analyst and consultant.
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and Bi...
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
Serveless Architectures brings the ability to independently scale, deploy and heal based on workloads and move away from monolithic designs. From the front-end, middle-ware and back-end layers, serverless workloads potentially have a larger security risk surface due to the many moving pieces. This talk will focus on key areas to consider for securing end to end, from dev to prod. We will discuss patterns for end to end TLS, session management, scaling to absorb attacks and mitigation techniques.
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...